All current Threat Intelligence Courses courses in 2024

75 Courses

Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK

Red team operations are most effective when tailored to test an organization's defenses against the most likely threat. Learn to leverage MITRE ATT&CK in combination with open source tools in the red team tools path to emulate APT attacks.Resources and time are limited and validation of security operations capabilities and defenses is elusive if no.
course image
provider Pluralsight
pricing Free Trial Available
sessions On-Demand

Security Analyst Fundamentals

Explore the burgeoning field of cybersecurity with the Security Analyst Fundamentals specialization offered through Coursera by IBM. With a projection of 3.5 million job positions opening globally by 2021 as reported by Forbes, the demand for skilled cybersecurity analysts has never been higher. This comprehensive specialization prepares you for th.
course image
provider Coursera  Specialization
pricing Paid Course
duration 17 weeks, 4 hours a week

CASP+ Cert Prep: 5 Research, Development and Collaboration

Title: CASP+ Cert Prep: 5 Research, Development and Collaboration Description: Dive into domain 5 of the CompTIA Advanced Security Practitioner (CASP+) exam with this detailed course from LinkedIn Learning. Covering Research, Development, and Collaboration, this course prepares learners for critical aspects of cybersecurity certifications. Provider.
course image
provider LinkedIn Learning
pricing Free Trial Available
duration 1-2 hours
sessions On-Demand

Palo Alto Networks Security Operations Fundamentals

Title: Palo Alto Networks Security Operations Fundamentals Description: Dive into the essentials of Security Operations (SecOps) through this comprehensive course offered by Coursera in partnership with Palo Alto Networks. Participants will explore the vital role of SecOps in safeguarding our digital lifestyle, safeguarding both businesses and thei.
course image
provider Coursera
pricing Free Online Course (Audit)
duration 9-10 hours
sessions On-Demand

Threat Modeling for Builders Workshop

Gain invaluable insights into the process of threat modeling with our intermediate-level, six-hour Threat Modeling for Builders Workshop. Perfect for software developers, product managers, systems engineers, and architects, this workshop will introduce you to the essential background of threat modeling, including its importance and utility. Learn t.
course image
provider AWS Skill Builder
pricing Free Certificate
duration 6 hours
sessions On-Demand

Threat Hunting: Network Hunting

Title: Threat Hunting: Network Hunting Description: Embark on the challenging journey of detecting anomalies and malicious behaviors in network environments with our comprehensive course, Threat Hunting: Network Hunting. This course is designed for individuals tasked with navigating through network traffic to pinpoint harmful activities, even witho.
course image
provider Pluralsight
pricing Free Trial Available
duration 1 hour 30 minutes
sessions On-Demand

Threat Modeling the Death Star

Title: Threat Modeling the Death Star Description: Join Mario Areias in an illuminating session titled "Threat Modeling the Death Star". Discover the innovative use of attack trees within the realm of DevOps and explore a dynamic approach to threat modeling that challenges traditional assumptions. This talk aims to shift the narrative from the cumb.
course image
provider Pluralsight
pricing Free Trial Available
sessions On-Demand

Threat Modeling with the Microsoft Threat Modeling Tool

Title: Threat Modeling with the Microsoft Threat Tool Description: Dive into the essentials of threat modeling using the Microsoft Threat Modeling Tool in our comprehensive course offered by Pluralsight. This course is designed not only for those looking to enhance the security of their systems but for anyone interested in learning about applicatio.
course image
provider Pluralsight
pricing Free Trial Available
duration 2-3 hours
sessions On-Demand

Performing Threat Modeling with the Microsoft Threat Modeling Methodology

Title: Performing Threat Modeling with the Microsoft Threat Modeling Methodology Description: Are you tired of discovering security vulnerabilities post-development? Identifying issues late in the process can be both risky and costly. This comprehensive course, provided by Pluralsight and titled "Performing Threat Modeling with the Microsoft Threat.
course image
provider Pluralsight
pricing Free Trial Available
duration 1-2 hours
sessions On-Demand

Performing Threat Modeling with the PASTA Methodology

Title: Performing Threat Modeling with the PASTA Methodology Description: Struggling to mitigate threats against your applications? Unclear on how to implement threat modeling effectively? Join our comprehensive course, "Performing Threat Modeling with the PASTA Methodology," offered by Pluralsight. In this enlightening session, you'll master the a.
course image
provider Pluralsight
pricing Free Trial Available
duration 1-2 hours
sessions On-Demand
All upcoming courses at Threat Intelligence Courses on the AI ​​Education website. Check out all courses Threat Intelligence Courses and choose the one that's right for you.